Skip to main content

Framework for Innovative Security Decisions

Remember the Periodic Table of chemical elements (Dayah, Dynamic Periodic Table, 1997)? It revolutionized chemistry and continues serving scientists daily. TRIZ is a similar resource for inventors and decision-makers.

36422 (PDF, 24.01MB)

3 Nov 2015
ByErgash Karshiev
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

A Startups Guide to Implementing a Security Program

Research Paper

Startups struggle to balance survival with the practical implementation of a security program. There...

  • 8 Oct 2020

Putting it all together through Automation

Research Paper

Most problems faced in Information Security are typically time sensitive. For Forensic Engineers and...

  • 22 Apr 2019

Information Security Best Practices While Managing Projects

Research Paper

To maximize long-term return on investment (ROI) with a project's delivery, taking information...

  • 25 Mar 2019

Logon Banners

Research Paper

Logon banners have been a common feature of operating systems and applications for many years....

  • 20 Mar 2019

Security Considerations for Team Based Password Managers

Research Paper

Password management applications are a common and practical way to store complex passwords. They use...

  • 23 Jul 2018

Content Security Policy in Practice

Research Paper

The implementation of Content Security Policy to leverage web browser capability in protecting a web...

  • 6 Jul 2018

Agile Security Patching

Research Paper

Security Patch Management is one of the biggest security and compliance challenges for organizations...

  • 3 May 2018

Speed and Scalability Matter: Review of LogRhythm 7 SIEM and Analytics Platform

Research Paper

Just how scalable, fast and accurate are SIEM tools when under load? To find out, we put the...

  • 13 Apr 2017
  • Dave Shackleford

Bill Gates and Trustworthy Computing: A Case Study in Transformational Leadership

Research Paper

The notion that IT security is a serious issue is non-controversial. The market for cybersecurity...

  • 20 Sep 2016

Filling the Gaps

Research Paper

There should be an emphasis on the importance of regular internal and external auditing focusing on...

  • 18 Aug 2016

Investing in Information Security: A Case Study in Community Banking

Research Paper

Small businesses, such as community banks, often do not have resources dedicated to information...

  • 12 Aug 2016

Introduction to Rundeck for Secure Script Executions

Research Paper

Many organizations today support physical, virtual, and cloud-based systems across a wide range of...

  • 11 Aug 2016

Using Information Security as an Auditing Tool

Research Paper

As cyber-attacks are gaining visibility within mainstream media, what once was knowledge for...

  • 14 Jul 2016

Applying Data Analytics on Vulnerability Data

Research Paper

Organizations, by law, should exercise due care and due diligence in securing data at rest, in...

  • 23 Dec 2015

Security Data Visualization

Research Paper

The objective of this paper is to provide guidelines on information security data visualization and...

  • 28 Oct 2015

Behind the Curve? A Maturity Model for Endpoint Security

Research Paper

Behind the Curve? A Maturity Model for Endpoint Security

  • 22 Oct 2015

The Sliding Scale of Cyber Security

Research Paper

The Sliding Scale of Cyber Security is a model for providing a nuanced discussion to the categories...

  • 1 Sep 2015

Protecting Third Party Applications with RASP Infographic

Research Paper

Protecting Third Party Applications with RASP Infographic

  • 27 Aug 2015

What Companies need to consider for e-Discovery

Research Paper

Within the legal environment, Discovery is the process of identifying, locating, preserving,...

  • 24 Aug 2015

Integration of Network Conversation Metadata with Asset and Configuration Management Databases

Research Paper

The use of encryption to protect the confidentiality of network communications is on the rise.

  • 26 May 2015

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.